Tag Archive for: Unknown

Advanced IP Scanner shows 250 unknown connections


I am not even sure if this is the proper place to start but I need some reassurance on this.  Or a major fix.  I know my puter doesn’t run like it should and my downloads are definitely slower than they should be.  Last night I ran the scanner mentioned in the topic title and it told me that  there were over 250 unknown connections to my puter.  On my network map, which they took away for some nefarious reason I am sure, there should not be anymore than 2 puters, 1 Roku, 1 Xfinity streaming box, 2 phones and a printer.  I got scared death when I saw this result and I would like to know or have an explanation for this.  One of the things connected was a game file from Steam that I played recently.  I don’t know if every game is one of the connections or not.  I have had this puter since around 2019 and it really acts goofy at times.  I installed premium Malwarebytes so I don’t know if my firewall is running or not. Settings says it is.   I ran FRST as instructed and will post the logs now.  Thank you so much for your kind attention to this matter. 

 

FRST Log:

 

Scan result of Farbar Recovery Scan Tool (FRST) (x64) Version: 22-05-2022
Ran by Dee Skelley (administrator) on DESKTOP-MRN08B1 (Gigabyte Technology Co., Ltd. AX370M-DS3H) (22-05-2022 18:49:04)
Running from C:\Users\Dee Skelley\Desktop
Loaded Profiles: Dee Skelley
Platform: Microsoft Windows 10 Home Version 21H2 19044.1706 (X64) Language: English (United States)
Default browser: FF
Boot Mode: Normal

==================== Processes (Whitelisted) =================

(If an entry is included in the fixlist, the process will be closed. The file will not be moved.)

(Advanced Micro Devices Inc. -> Advanced Micro Devices, Inc.) C:\Program Files\AMD\CNext\CNext\AMDRSServ.exe
(Advanced Micro Devices Inc. -> Advanced Micro Devices, Inc.) C:\Program Files\AMD\CNext\CNext\RadeonSoftware.exe
(C:\Program Files\AMD\CNext\CNext\AMDRSServ.exe ->) (Advanced Micro Devices Inc. -> Advanced Micro Devices, Inc.) C:\Program Files\AMD\CNext\CNext\amdow.exe
(C:\Program Files\AMD\CNext\CNext\AMDRSServ.exe ->) (Advanced Micro Devices Inc. -> Advanced Micro Devices, Inc.) C:\Program Files\AMD\CNext\CNext\AMDRSSrcExt.exe
(C:\Program…

Source…

Unknown, uninvited strangers joining online classrooms


He said “robust and comprehensive steps” should be taken to protect children’s personal information.

Susan McLean, a leading cyber-safety expert with decades of experience, said teachers and students needed to be better trained in the respectful and responsible use of technology, including security settings as well as clear expectations for conduct.

“We don’t give someone the keys to the car and go, ‘here, hop in, off you go’, and hope for the best,” Ms McLean said. “Sadly, that is what I’m seeing in a lot of schools”.

When things went wrong, such as strangers joining online classrooms, she said, the department and schools should “respond promptly, proactively and honestly”, including alerting their community that a breach had occurred.

Ms McLean also flagged concerns around teachers taking screenshots of online classrooms with “50 little faces up on the screen” and sharing these images on social media.

Samantha Floreani, the program lead at Digital Rights Watch, said strangers accessing virtual learning environments was not the only threat to the privacy, security and safety of children and young people.

“Requiring students to sign up to third-party applications and provide their personal information, all which have varying collection, use and disclosure practices, can create security and privacy risks if those services do not meet adequate standards,” she said.

Ms Floreani echoed calls for teachers to be supported and trained in effectively using settings to “increase the security of online learning environments”.

Vanessa Teague, an expert in cyber security and privacy, said risks should be addressed with better password protection, using services with end-to-end encryption, and by making privacy education part of the curriculum.

“Children should be taught that the internet is a public place, and that they should never share any sensitive information online,” she said.

Loading

However, children were often pressured in the opposite direction, Dr Teague said, “by normalising surveillance and making them feel that they’re not participating in their class if they’re not showing a video of their bedroom”.

“It’s up to all of us adults to…

Source…

Singtel Suffers Zero-Day Cyberattack, Damage Unknown – Threatpost



Singtel Suffers Zero-Day Cyberattack, Damage Unknown  Threatpost

Source…

DPRK hackers used an unknown Internet Explorer bug to attack security analysts


News Highlights: DPRK hackers used an unknown Internet Explorer bug to attack security analysts

.

Days after Google disclosed a cyber campaign, South Korean company finds criminals who used zero-day in Internet Explorer

Hackers previously linked to North Korea by Google researchers used an unknown vulnerability in Internet Explorer to target cybersecurity experts, a South Korean company said.

Two weeks ago, Google’s Threat Analysis Group (TAG) shocked the cybersecurity community by revealing a month-long social engineering campaign in which hackers posed as fellow security researchers, tricking targets into collaborating on projects and viewing their blog. When researchers visited the website, a previously undiscovered zero-day vulnerability in Chrome infected some users with malware.

The same hackers Google attributed to the Lazarus Group linked to North Korea, too

Read more from Source
Copyright @ www.nknews.org

  • Check the latest Hacking news updates and information.
  • Please share this news DPRK hackers used an unknown Internet Explorer bug to attack security analysts with your friends and family to support us your one share helps us a lot.
  • Follow us on Facebook and Twitter if you need more updates like this.
Compsmag is supported by its audience. When you buy through links on our website, we may earn an affiliate commission fee. Learn more

Source…